Is it really you?

Submitted by CyberHub Summit on Mon, 08/13/2018 - 13:39
Is it really you?
Is it really you?

Identity theft is spiraling out of control and it's becoming harder and harder to prove who you are on the internet.

Cyber criminals are advancing their techniques and aiming at cyber identity vulnerabilities to cash out by stealing personal data to sell at profit, on the dark net. 


You've Got Mail

Submitted by CyberHub Summit on Fri, 08/10/2018 - 13:07
You've Got Mail
You've Got Mail

Emails are becoming an unavoidable threat to our security.

Both emails and attachments can be highly hazardous to the health of your business.

Why?


What's the Big Deal about SamSam?

Submitted by CyberHub Summit on Fri, 08/10/2018 - 12:15
What's the Big Deal about SamSam?
What's the Big Deal about SamSam?

On the whole, whilst spreading ransomware, the usual malware suspects use old-fashioned strategies that 'hit and hope' with as many victims as possible, such as in mass-pool spam campaigns, sent to thousands, potentially hundreds of thousands of possible targets.


When you fly, no Wi-Fi

Submitted by CyberHub Summit on Fri, 07/20/2018 - 13:00
When you fly, no Wi-Fi
When you fly, no Wi-Fi

Nothing characterizes contemporary employment better than liquidity. The flexibility that cell phones and lap tops have given us to work on- the-go, is tremendous, yet from a security perspective – fraught with challenges.

It is extremely difficult to provide speedy internet and data without compromising security, as end-to-end encryption is loaded with vulnerabilities and this is nowhere more evident than at the airport.


Introduction to the Dark Web

Submitted by CyberHub Summit on Wed, 07/18/2018 - 15:54
Introduction to the Dark Web
Introduction to the Dark Web

The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.


The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

Submitted by CyberHub Summit on Thu, 07/05/2018 - 17:40
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.

Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.


5 Simple Truths about Cryptocurrency

Submitted by CyberHub Summit on Mon, 06/25/2018 - 14:45
5 Simple Truths about Cryptocurrenc
5 Simple Truths about Cryptocurrency

The cryptocurrency world is in hot and volatile water again with Bithumb, the world's sixth most active crypto trading platform declaring that hackers stole 35bn in crypto cash (that's a Dollar value of $31.6m) 'overnight' last week. This is the second time in a week that South Korean crypto-currency exchanges have been attacked, with Coinrail being last week's 40bn crypto-coin victim.


Kids and Smart Phones.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 16:19
Kids and Smart Phones.
Kids and Smart Phones.

Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.